Derek Noonburg sent us a patch for xpdf to correct a number of security issues.
This is due to be public 20051201.
An attacker could construct a carefully crafted PDF file that could cause Xpdf
to crash or possibly execute arbitrary code when opened.
This issue affects RHEL3, RHEL3, RHEL2.1
Created attachment 121332 [details]
Proposed patch from Derek
This issue is now public:
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.
The original fix for these issues was incomplete, reopening bug.
Created attachment 122226 [details]
Patch from Ubuntu
Created attachment 122227 [details]
Patch from Dirk Mueller to add additional missing checks
There aren't currently any reproducers for these issues.
Please note that these issues affect xpdf, kdegraphics, cups, gpdf, tetex and
poppler. Some cooperation will probably make things easier.
it's now fixed in xpdf-3.00-11.10
xpdf-2.02-9.8 and xpdf-0.92-17
Adding the folling CVE ids to this errata:
These were all fixed in the errata RHSA-2005:840